Tiger

From The ECRYPT Hash Function Website
Revision as of 13:10, 7 March 2008 by Tnad (talk | contribs)

1 General

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

3 Performance Evaluation / Implementation (HW and SW)